Current location - Education and Training Encyclopedia - University rankings - Papers published by Evian Lee.
Papers published by Evian Lee.
[1], Li Renfa, Tong, Edwin H.M. Sha. Research progress on power consumption analysis and attack and defense of embedded encryption chip. Computer research and development, 20 10/0,47 (47 (4): 595-604.ei

[2] Evian Lee, Li Renfa. PFM: an SMS4 algorithm against high-order power attack. Journal of Communication, 20 10/0,31(5): 87-92. Including EI.

[3] Evian Lee, Li Renfa, Zou Yi. Research on quantitative model of anti-power attack ability of cryptographic algorithm chip. Journal of Hunan University, 20 10/0,37 (3): 73-76. Including EI.

Evian Lee, Li Renfa. Simplified second-order differential power consumption attack method using fixed value mask and its defense measures. Microcomputer system, 20 10/0,31(9):1894-1898.

Evian Lee, Li Renfa. Differential power attack on SMS4 encryption algorithm. Computer Science, 20 10/0,37 (7): 39-41.

Evian Lee, Li Renfa, Li Jing. Research on an efficient experimental platform for electric power attack physics. Computer Science, 20 10/0,37 (6): 75-77.

, Li Renfa, Xu. Research and application of an efficient power consumption model in power consumption attack experiment. Research on Computer Application, 26, 2009 (12): 4722-4723.

Evian Lee, Li Renfa. Summary of research on security SoC against power consumption attack. Computer Science, 2009, 36(6): 16- 18.

Evian Lee, Li Renfa. A summary of research on hybrid systems. Research on Computer Application, 2008,25 (8): 2255-2259.

[10], Li Renfa, Jiao. Research on anti-power attack of an ECC encryption chip. Microelectronics and Computer, 20 1 1, 28 (1): 27-30.

Evian Lee, Li Renfa. Learn from world-class universities and explore advanced curriculum structures. Computer Education, 2008, 5:23-26.

[12], Xu, Wei Shudi. Research and implementation of simulation experimental platform for packet interception. Journal of Hengyang Teachers College, 29, 2008 (3): 97-101.

Evian Lee. Research on the present situation of classroom teaching in colleges and universities and the improvement of teaching effect. Journal of Hengyang Normal University, 20 10/0,6

[14] Evian Lee, Li Kenli, Jiao Cr, Zou Yi. Research on physical power attack experimental platform based on AT89C5 1. Research on Computer Application, 2012,29 (7): 2681-2682. core

[15] Evian Lee, Liu Yang, Li Kenli, et al. Research on ECC bypass attack method of elliptic curve cryptosystem. Computer application research, 20 13. 3.

Li Lang, Li Kenli. Anti-DPA algorithm in trusted computing system. LNCS。 20 13.6。 Engineering index